With a __________ attack the attacker is allowed to use the user as an "oracle". This means that the user may request signatures of messages that depend on previously obtained message-signature pairs.
A. adaptive chosen message
B. generic chosen
C. directed chosen message
D. known message
A. adaptive chosen message
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a set of columns whose values match the primary-key values of an- other table.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
__________ is not a tenet of the RISC processor-design philosophy.
a) Making the common case fast b) Reducing context switch latency c) Reducing the number of register–memory transfers d) Keep hardware simple
Computer Science & Information Technology